Volume 13 , Issue 1 , PP: 36-45, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Rajeev Shrivastava 1 *
Doi: https://doi.org/10.54216/JCIM.130104
In a complicated situation, the Internet of Things simplifies the process of connecting a wide range of things. Because of its openness and lack of human control, the Internet of Things is open to assaults like denial of service (DoS) and man-in-the-middle attacks. Furthermore, any device that can connect to the internet may be hacked. These attacks put the network connections and the actual equipment at danger. IoT security and privacy will so be compromised. Due to its limited power, bandwidth, and storage, the Internet of Things requires a security solution that does not overload it. This study aims to preserve consumers' trust in the Internet of Things (IoT) by safeguarding their data against unauthorised access and maintaining the privacy of their personal information. With the ultimate objective of presenting a unique hybrid and optimised lightweight logical security architecture to ensure data privacy and integrity while making effective use of available resources, all research are carried out with this purpose in mind. The Hybrid Lightweight Security Framework (HLSF), which this study suggests, offers secrecy and integrity in addition to authentication. The structure consists of three distinct steps. The first step is registration, the second is authentication, and the third is transit security, which protects data while it is being transported. Compared to other current frameworks, the results reveal that HLSF performs better in terms of precision, recall, and accuracy when applied to an IoT situation.
IoT , HLSF , COAP , Security.
[1]. JS. Silva, P. Zhang, T. Pering, F. Boavida,T. Hara,NC. Liebau, ―People-centric internet of things, IEEE Communications Magazine, vol. 55, no. 2, pp-18-19, Feb. 2017.
[2] A. Whitmore, A. Agarwal,L. Da Xu, ―The Internet of Things—A survey of topics and trends, Information Systems Frontiers, vol. 17, no. 2, pp. 261-274, Apr. 2015.
[3] AK. Luhach AK, SK. Dwivedi, CK. Jha, ―Applying SOA to an E-commerce system and designing a logical security framework for small and medium sized E-commerce based on SOA, In 2014 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1-6, Dec. 2014.
[4]. M. Chernyshev, Z. Baig, O. Bello, S. Zeadally, ―Internet of Things (IoT): research, simulators, and testbeds,‖ IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1637-1647, Jun. 2018.
[5] R. Hamidouche, Z. Aliouat, AM. Gueroui, AA. Ari, and L. Louail. "Classical and bio-inspired mobility in sensor networks for IoT applications." Journal of Network and Computer Applications, Jul. 2018.
[6]. S. Ezdiani, I.S. Acharyya, S. Sivakumar, A. Al-Anbuky, ―An IoT environment for WSN adaptive QoS,‖ In 2015 IEEE International Conference on Data Science and Data Intensive Systems, IEEE, pp. 586-593, Dec. 2015.
[7] J. Liu, Y. Li, M. Chen, W. Dong, D. Jin, ―Software-defined internet of things for smart urban sensing,‖ IEEE communications magazine, vol. 53, no. 9, pp. 55-63, Sep 2015.
[8]. F. H. Bijarbooneh, W. Du, E.C Ngai, X. Fu, J. Liu, ―Cloud-assisted data fusion and sensor selection for internet of things, IEEE Internet of Things Journal, vol. 3, no. 3, pp. 257-268, Jun 2016.
[9] A. Rajeswari, R. Manavalan, ―Data collection methods in wireless sensor network: A study, Int. J. Res. Appl. Sci. Eng. Technol, pp. 259-282, Sep. 2014.
[10]. Y. Yang, H. Peng, L Li, and X. Niu. "General theory of security and a study case in internet of things." IEEE Internet of Things Journal, vol. 4, no. 2, pp. 592-600, Apr. 2017.
[11]. H. Hellaoui, M. Koudil, A. Bouabdallah, ―Energy-efficient mechanisms in security of the internet of things: A survey,‖ Computer Networks, pp. 173-189, Nov. 2017.
[12] D. He, R. Ye, S. Chan, M. Guizani, and Y. Xu. "Privacy in the Internet of Things for Smart Healthcare," IEEE Communications Magazine, vol. 56, no. 4, pp. 38-44, Apr. 2018.
[13] W. Li, H. Song, and F. Zeng. "Policy-based secure and trustworthy sensing for internet of things in smart cities," IEEE Internet of Things Journal, vol. 5, no. 2, pp. 716-723, Apr. 2018.
[14] Y. Kawamoto, H. Nishiyama, N. Kato, Y. Shimizu, A. Takahara, and T. Jiang. "Effectively collecting data for the location-based authentication in Internet of Things," IEEE Systems Journal, vol. 11, no. 3, pp. 1403-1411, Sep. 2017.
[15]. Anuradha, M.; Jayasankar, T.; Prakash, N.; Sikkandar, M.Y.; Hemalakshmi, G.; Bharatiraja, C.; Britto, A.S.F. IoT enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess. Microsyst. 2021, 80, 103301.
[16]. Irshad, A.; Usman, M.; Chaudhry, S.A.; Bashir, A.K.; Jolfaei, A.; Srivastava, G. Fuzzy-in-the-Loop-Driven Low-Cost and Secure Biometric User Access to Server. IEEE Trans. Reliab. 2020, 70, 1014–1025. [17]. Chaudhry, S.A.; Farash, M.S.; Kumar, N.; Alsharif, M.H. PFLUA-DIoT: A pairing free lightweight and unlinkable user access control scheme for distributed IoT environments. IEEE Syst. J. 2020, 16, 309–316.
[18]. Mishra, N.; Pandya, S. Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review. IEEE Access 2021, 9, 59353–59377.
[19]. Hameed, A.; Alomary, A. Security issues in IoT: A survey. In Proceedings of the 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), Sakhier, Bahrain, 22–23 September 2019; pp. 1–5.
[20]. Lu, Y.; Da Xu, L. Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics. IEEE Internet Things J. 2019, 6, 2103–2115.
[21]. Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 2019, 7, 82721–82743.
[22]. Jurcut, A.; Niculcea, T.; Ranaweera, P.; Le-Khac, N.-A. Security Considerations for Internet of Things: A Survey. SN Comput. Sci. 2020, 1, 1–19.
[23]. Kouicem, D.E.; Bouabdallah, A.; Lakhlef, H. Internet of things security: A top-down survey. Comput. Netw. 2018, 141, 199–221.
[24]. Sha, K.; Yang, T.A.; Wei, W.; Davari, S. A survey of edge computing-based designs for IoT security. Digit. Commun. Netw. 2020, 6, 195–202.
[25]. Yousefnezhad, N.; Malhi, A.; Främling, K. Security in product lifecycle of IoT devices: A survey. J. Netw. Comput. Appl. 2020, 171, 102779.
[26]. Yugha, R.; Chithra, S. A survey on technologies and security protocols: Reference for future generation IoT. J. Netw. Comput. Appl. 2020, 169, 102763.